Field of the invention
The invention relates to radio identification, and more particularly to a system
the presence of objects.
Background of the invention
often carry important things with them, such as: Eg passports, plane tickets,
Watches, medicines, eyeglass cases, insurance cards, laptop computers,
Power supplies, cameras, cell phones or even golden pens.
When traveling, be it over
Distances or just for a business meeting, pack
People often take these things in and out, or carry things
in more than one bag with you. These things are therefore sometimes
forget when you get out of a taxi, packing a vacation suitcase,
Checking out of a hotel or leaving a business meeting. Even
if nothing is forgotten, you have to take care of that
It is ensured that all important things are included.
There are several systems for using radio frequency identification (Radio Frequency
Identification, RFID) for tracking or recognition of objects. RFID devices
are for sale
and RFID tags can
attached to objects. The RFID tag can then use a
Scanner to be identified. This provides the opportunity for a system to auto-personal items
tracking without having to search through pockets or lists
System (described in New Scientist, "Tags to Banish Forgetfulness", August 14, 2004,
before, an RFID detector in a wristwatch and an interrogator
in a separate device
to install. The RFID interrogator sends signals to trigger that
the RFID tags send their RFIDs. The RFIDs are from the RFID detector
recognized in the person's watch. If RFID tags on important, from the
Things are attached, recognizes when the person using the RFID interrogator
happens, the RFID detector in the watch all the RFIDs that are missing, and
Notifies the person if personal things are missing, if so
the case is.
System requires because of the small size of a clock and the size of RFID interrogators
an external and separate request facility. The system is what
the user also affects
passive, because the user just over
Missing things will be notified when connected to fixed RFID interrogators
that comes in strategic places. And though it is
is to alert the user to missing items, the system can
do not help or indicate when searching for the missing item,
where the object was last recognized, to the variety of possible
Restrict places when searching for the item.
discloses a bearing control system including an anti-collision, radio-recognition device or tags affixed to each article of the bearing and containing a unique modulation code, a requesting device / reader having a field of sufficient strength to activate each tag associated with each item of the warehouse in communication with a computer. The computer includes a list that includes an identifier for each item in the warehouse, the modulation code for the tag associated with each item in the warehouse, and an item status, the status indicating whether the item is present or absent.
Summary of the invention
According to one
Aspect of the invention, a method is provided to detect the presence
detected with radio-frequency identification (RFID) tags.
A current list of items
is saved. In response to a request from a user
The detection of RFID tags on every item in the current
List tried. For
whose RFID tags are not in the detection area, the
User notifies that the item is missing. In one embodiment will
stored an item list, the list at least one
where each record corresponds to an item and a name
the object and the RFID of the RFID tag of the object stores.
There are ways lists
generated containing RFIDs from the item list. One of the
Route lists is determined as the current list. The as current list
The path list to be determined can be determined by the user. alternative
To do this, the current list may be based on a current location
be determined, with each path list a geographical area
assigned. As yet another alternative, the current
List based on trigger items within
of the detection area, each path list
with at least one trigger item
In one embodiment, a current location is determined. The last known location of each item is saved. For items for which the RFID tag is recognized as being within the detection range, the current location will be the last one known place. For items for which the RFID tag is not recognized as being within the detection range, the last known location is displayed.
According to one
Another aspect of the invention provides another method.
to the presence of objects
detected with radio-frequency identification (RFID) tags.
An item is selected from a list of items. In response to a query
By a user, the detection of whether the RFID tag of the item
is within the detection range, tries repeatedly.
If the RFID tag of the item is within the detection range
is located, the user is notified.
There is also provided an apparatus for implementing the invention.
Instructions for implementing the invention may be made on a computer readable
Medium are stored, with the instructions from a processor
Method and apparatus of the invention allow a person
fast and reliable
to check that
they all personal
with you. By marking lists of important things that
with an RFID tag
labeled, it allows a person's invention to be simple
Query a personal
Perform communication device in which implements the invention
is, such. A personal digital assistant or mobile phone,
to check that
Things are on a list with the person. The inherent communications infrastructure
RF transmitter, receiver
and modulation codes) and the parent
Communication interface of personal communication devices
(in terms of
other portable electronic devices, such as watches) can do this
used, the implementation and operation of the invention
to simplify. The invention allows a user to own
Feel free to ask for missing things, what along with the placement
the RFID interrogator in the same communication device
like the RFID detector allows a user, in any place
to ask missing things, even when traveling. In one execution allowed
the invention also tells the user to identify where a missing one
Item was last detected.
Brief description of the drawings
Features and advantages of the invention will become apparent from the following
detailed description of the preferred embodiment (s) with reference to the accompanying drawings
Drawings more clearly in which:
1 Fig. 10 is a block diagram of an item tracking system according to an embodiment of the invention; and
2 Figure 5 is a flowchart of a method by which the item tracking system verifies the presence of personal items in accordance with an embodiment of the invention.
It should be noted that in the attached figures the same characteristics
bear the same names.
Detailed description of the designs
Regarding 1 FIG. 12 is a block diagram of an item tracking system in accordance with one embodiment of the invention. FIG. The Item Tracking System 8th contains a tracker 10 that has a user interface 12 accessible to a user. The Chaser 10 is in communication with a radio-frequency detection (RFID) detector 13 who is an RFID interrogator 14 and an RFID receiver 15 contains, each of which in turn communicating with a radio interface 16 is. The Chaser 10 is also in communication with a store 18 which can be any type of memory accessible to the tracker, including RAM in the tracker itself or a database in the core network infrastructure of a mobile service provider. The pursuer is also in communication with a location detector 20 , The Item Tracking System 8th is preferably located in a personal digital assistant (PDA) or in a mobile phone, although the system is used in other universal personal communication devices, such as personal digital assistants. As laptop computers, can be located. If it is in a PDA or a mobile phone, the RF interface may be the normal RF interface of the PDA or mobile phone, and the user interface is the normal interface of the PDA or mobile phone. The reuse of the RF interface of the personal communication device is particularly advantageous when the personal communication device uses soft radio, as the software control of RF functions via an extremely versatile RF input allows to implement the invention particularly efficient. If the personal communication device in which the object tracking system 8th implemented is a laptop computer with wireless communication, the RFID detector can 13 implemented as a USB, PCMIA, or other commonly used plug-in module.
The location detector 20 is any facility that is capable of determining the location of the communication device in which the object tracking system 8th is implemented, such. As a GPS to determine. Location detectors are becoming more widespread and are often available in communication devices, such as cell phones, for example, to determine the location from which an emergency call is made. The location detector 20 may be a stand-alone sub-component of the portable device, such as. B. a GPS receiver. Alternatively, the location detector 20 a sub-element of a location system based in part on a mobile base station infrastructure for location by triangulation.
In the preferred embodiment, the tracker 10 the form of software in a processor. More generally, the instructions for implementing the tracker 10 have the form of any combination of software or hardware, including hardware in an integrated circuit. The processor does not need to be a single device, but the instructions may be located in more than one device.
The Chaser 10 presents a menu to the user via the user interface. The menu allows the user to manage an item list stored in memory 18 is stored. The item list contains records, each record corresponding to a personal item. Each record contains an RFID, a name of the personal item and a location of the personal item. The RFID corresponds to the RFID attached to the personal item. The name of the personal item is entered by the user, such as: Eg "wallet" or "passport". The menu allows the user to input the RFID associated with a personal item and the name to be associated with the personal item. The location is entered by the tracker, as described in greater detail below. The menu allows the user to enter records for new personal items, change the names of personal items in the item list, change the RFID of personal items in the item list, or delete records from the item list.
The menu also allows users to create one or more route lists. Each way list has a name and at least one RFID stored in the item list. For each route list desired by the user, the user enters a name of the route list, such as the route list. "International travel" and selects one or more RFIDs from the item list. The way list or the way lists are stored in memory 18 saved. The menu allows users to generate new waylists to add personal items to existing waylists by referring to the RFID of the personal item in the item list, to delete personal items from existing waylists, waylists to delete and rename route lists. The menu also allows the user to specify one of the way lists as the current list.
The menu also allows users to specify the last known location of the personal items in the item list. The location of the personal items is stored in the item list as below with reference to step 40 in 2 described.
To check for the presence of personal items, the user selects the function from that on the user interface 12 presented menu. Alternatively, a symbol may be displayed in the display of the device in which the tracker is implemented, allowing the user to check the presence of personal items with a single touch. As another alternative, a key or keyboard shortcut on the device in which the tracker is implemented may be connected to the tracker so that the user can access the tracker's presence check function simply by using the existing hardware buttons on the device can.
Regarding 2 FIG. 10 is a flowchart of a method by which the item tracking system 8th verifies the presence of personal items according to an embodiment of the invention. The procedure is initiated by the user as described in the previous section. In step 30 the tracker accesses the current list previously set by the user. When in step 31 If the tracker determines that no current list has been set by the user, or the current list does not contain any RFIDs, the user will be taken in step 32 notified about it.
In step 34 The tracker retrieves the next RFID in the current list, which is the first RFID when the existence check is started. In step 36 the pursuer passes the RFID to the RFID detector 13 , The RFID interrogator 14 in the RFID detector sends an RF signal via the RF interface 16 in an attempt to prompt RFID tags to send their corresponding RFID. The RFID receiver 15 Detects the presence of the RFID tag if the RFID tag is within range of the receiver and is not shielded. The preferred detection range of the RFID receiver is 2 meters. If the RFID receiver 15 via the RFID interface 16 an RFID detects the RFID returns a signal to the tracker 10 indicating if the RFID tag was detected.
When in step 36 the Chaser 10 learns that the RFID has not been detected, the tracker marks 10 in step 38 the RFID as missing. The pursuer then tries in step 34 to recognize the next RFID in the current list.
If the pursuer 10 in step 36 determines that the RFID was detected, asks the tracker in step 40 then the location detector 20 to determine the location of the device in which the invention is implemented. The Chaser 10 stores the location in the item list. The pursuer then tries in step 34 to recognize the next RFID in the current list.
If the pursuer 10 in step 34 determines that there is no next RFID in the current list, the tracker has attempted to verify the presence of all personal items in the current list. In step 42 informs the pursuer 10 the user via the user interface 12 about the result of the presence check. The user is either informed that all personal items in the current list are nearby, or the missing personal items are identified by the names contained in the item list. At that point, the user may be given the opportunity to query the last known location of the missing personal items.
The invention has been described as monitoring the last known locations of the items in the item list. It is assumed that the device in which the invention is implemented is equipped with a location detector. Although personal communication devices are increasingly equipped with location detectors, many existing devices do not have such location detectors. In an alternative embodiment of the invention, the location recognition functions of the invention are either off or not present altogether. In such an embodiment, there is no location detector 20 , the records in the item list contain no location information, and step 40 out 2 the determination and storage of the location of the personal items whose RFID tags were detected is omitted.
The invention has been described so that waylists are defined and the user can manually select one of the waylists as the current list. Alternatively or additionally, the user may define waylists regarding geographic locations. The waylists are stored in memory associated with geographic parameters such as latitude and longitude of boundaries or distances from a geographical point. For example, a first way list may be assigned as within 30 km of a given point, and a second way list may be assigned as more than 30 km away from a given point. When the user queries for the presence of personal items, the tracker calls 10 the current location of the personal communication device from the location detector 20 from. The pursuer asks the one in the store 18 stored path lists, retrieves the route list associated with the current location of the personal communication device, and uses the route list as a current list for determining which personal items to search for.
As yet another alternative to the user manually selecting one of the waylists as the current list, each list may be a personal trigger item or a combination of in memory 18 be assigned to stored personal items. When the user queries for the presence of personal items, the tracker calls 10 the trigger item or items for each way list, and use the RFID detector 13 to determine if any of the trigger items are in the range of the RFID receiver 15 located. If a trigger object or a combination of objects is found to exist, the tracker will use 10 the associated route list as a current list for determining what personal items to look for. If no trigger item or combination of items is found to exist, the user may be notified and prompted to manually select a current list, or the tracker may use a default list of routes as the current list.
The invention has been described as performing a single search for at least one personal item stored in a current list. The invention may additionally provide the ability to locate an item by repeated "pinging". In such an environment, the user selects a personal item from the item list, thereby effectively creating a current list having only one item. The user selects a localization option that triggers the functionality to locate an item. In response to the user selection, the tracker determines whether the only item in the current list is in the recognition area, as described above with respect to step 36 in 2 described. If the item is in the detection area, the tracker notifies the user of the presence of the item via the user interface. If the item is not in the detection area, the tracker may notify the user of the lack of the item through the user interface, for example play by continuing to display an icon or message "Find ...". During this process, the user will ping the portable device to various locations where the relocated item is likely to be found. The tracker proceeds to determine if the item is in the detection area until the user enters an entry stop, such as the user. Example by selecting a search end from a menu, by turning off the electronic device or by pressing a stop button.
The Item Tracking System 8th can as a pursuer 10 be implemented in a mobile phone or a PDA, and as an RFID detector 13 which is implemented as a USB or PCMIA slot in a laptop computer. The Chaser 10 communicates with the RFID detector 13 over the laptop computer via a simple communication protocol. Although not as comfortable as the item-tracking system 8th to implement on a single electronic device, such an implementation still offers the benefits of providing a convenient user interface 12 , the portability and the ability to allow a user to query the presence of personal belongings at will and not to passively wait for the system informing the user only about missing items when the user passes certain locations identified with stand-alone RFID tags; Interrogators are equipped.
The described embodiments are only examples, and those skilled in the art will recognize that changes may be made in the embodiments described above without departing from the spirit of the invention. Method that is logically equivalent or similar to the above with reference to 2 can be used to implement the methods of the invention. The scope of the invention is defined solely by the appended claims.